this paper presents a technique to integrate energy efficient ubiquitous sensors to work in a network for optimum control. this optimization technique can reduce power consumption by using wireless communicating senso...
详细信息
this paper presents a technique to integrate energy efficient ubiquitous sensors to work in a network for optimum control. this optimization technique can reduce power consumption by using wireless communicating sensors with a supervisor control. this supervisory control of the sensors gives it an advantage of being controllable from any embedded, desktop or Internet platform. Sensors for different purposes can work together to form a network which can be implemented in many environment like homes, city, hospitals and remote locations like mountains, forests etc. We employed an optimized sensing system and algorithm which reduced the number of sensors and power consumption.
the Knowledge engineering (KE) techniques are essentially based on the knowledge transfer approach, from domain experts directly to systems. However, this has been replaced by the modelling approach which emphasises u...
详细信息
the Knowledge engineering (KE) techniques are essentially based on the knowledge transfer approach, from domain experts directly to systems. However, this has been replaced by the modelling approach which emphasises using conceptual models to model the problem-solving skill of the domain expert. this paper discusses extending the Unified Modelling Language by means of a profile for modelling knowledge-based system in the context of Model Driven Architecture (MDA) framework. the profile is implemented using the executable Modelling Framework (XMF) Mosaic tool. A case study from the health care domain demonstrates the practical use of this profile; withthe prototype implemented in Java Expert System Shell (Jess). the paper also discusses the possible mapping of the profile elements to the platform specific model (FSM) of Jess and provides some discussion on the Production Rule Representation (FRR) standardisation work.
Recently, as speeds of computer processors and networks are rapidly increasing, a lot of researches are actively progressing to develop efficient and lightweight parallel computing platforms using heterogeneous and ne...
详细信息
Recently, as speeds of computer processors and networks are rapidly increasing, a lot of researches are actively progressing to develop efficient and lightweight parallel computing platforms using heterogeneous and networked computers. According to this technical trend, this paper designs and implements a message passing library called JMPI(Java Message Passing Interface) which complies with MP], the MPI standard specification for Java language. this library provides some graphic user interface tools to enable parallel computing environments to be configured very simply by their administrators and JMPI applications to be executed very conveniently. Especially, it is implemented as two versions based on two typical distributed system communication mechanisms, Socket and RMI. According to these communication mechanisms, the performance of each message passing system is evaluated by measuring its processing speed with respect to the increasing number of computers by executing three well-known applications. Experimental results show that the most efficient processing speedup can be obtained by increasing the number of the computers in consideration of network traffics generated by applications.
One of the important design criteria for distributed systems and their applications is their reliability and robustness to hardware and software failures. the increase in complexity, inter connectedness, dependency an...
详细信息
One of the important design criteria for distributed systems and their applications is their reliability and robustness to hardware and software failures. the increase in complexity, inter connectedness, dependency and the asynchronous interactions between the components that include hardware resources (computers, servers, network devices), and software (application services, middleware, web services, etc.) makes the fault detection and tolerance a challenging research problem. In this paper, we present an innovative approach based on statistical and data mining techniques to detect faults (hardware or software) and also identify the source of the fault. In our approach, we monitor and analyze in realtime all the interactions between all the components of a distributed system. We used data mining and supervised learning techniques to obtain the rules that can accurately model the normal interactions among these components. Our anomaly analysis engine will immediately produce an alert whenever one or more of the interaction rules that capture normal operations is violated due to a software or hardware failure. We evaluate the effectiveness of our approach and its performance to detect software faults that we inject asynchronously, and compare the results for different noise level.
In the context of detecting possible copyright infringement, finding a correlation between the source code files for two different programs does not necessarily mean that illicit behavior occurred. Ideas, concepts, fa...
详细信息
In the context of detecting possible copyright infringement, finding a correlation between the source code files for two different programs does not necessarily mean that illicit behavior occurred. Ideas, concepts, facts, processes and methods are not in themselves protected by copyright law. therefore, not everything in software is subject to copyright or patent protection. It is possible to write softwarethat is not protected by either. Expert opinion may be needed in court in order to determine whether an intellectual property infringement has occurred or not. this may involve a comparison of the source code. this basic legal requirement is explicitly the core of the case. the main contribution of this paper is the suggestion of a framework for understanding of the legal consequences of similarity in software code. Because comparing two works of software is not as simple as a line-by-line comparison.
Where customers with different membership and position, use computers as in the university network systems, it often takes much time and efforts for them to cope withthe change of the system management. this is becau...
详细信息
Where customers with different membership and position, use computers as in the university network systems, it often takes much time and efforts for them to cope withthe change of the system management. this is because the requirements for the respective computer usage are different in the network and security policies. In this paper, destination addressing control system scheme (DACS scheme) for the university network services is shown. the DACS scheme performs network management efficiently through the communication management of a client. As the characteristic of DACS scheme, only the setup modification is required by a system administrator, when configuration change of the network system is performed. then, the setup modification is unnecessary by a customer, which shows a merit for both a system administrator and a customer. However, there is a problem to be solved. In existing DACS scheme, it is promised that, DACS client for controlling the communication must be implemented on all clients. When the client not installing DACS client is connected to the network, each network server can be accessed from the client. therefore, in this paper, secure DACS scheme with function to prevent the communication from the client not installing DACS client, is proposed and examined.
the lack of flexibility of the current automated visual inspection (AVI) systems to accommodate new products is one of the main problems faced by users of these systems. In this paper, the authors propose a framework ...
详细信息
the lack of flexibility of the current automated visual inspection (AVI) systems to accommodate new products is one of the main problems faced by users of these systems. In this paper, the authors propose a framework that will facilitate the design of highly reconfigurable AVI systems possible. the proposed framework is based on five modules: the feature generation module (FGM), the feature selection module (FSM), the decision engine module (DEM), the performance assessment module (PAM), and the refinement and improvement module (RIM).
An interactive component consumes a stream of input messages and produces a stream of output messages. the input/output behaviour describes the service offered by the component without disclosing the implementation. I...
详细信息
An interactive component consumes a stream of input messages and produces a stream of output messages. the input/output behaviour describes the service offered by the component without disclosing the implementation. In general, an interactive component provides the contracted service only for a subset of input histories, called its service domain. We investigate the input/output behaviour of interactive components for erroneous input streams outside the service domain. We specify a fault sensitive behaviour, a fault tolerant behaviour, a robust behaviour, and a fault correcting behaviour by enlarging the regular behaviour in a systematic way. We implement the different behaviours by state transition machines where we enlarge the regular state space by additional information. Altogether we provide schematic transformations both on the specification and on the implementation level how to extend the regular behaviour of an interactive component to input streams outside the service domain. the resulting formal method separates the aspects of service provision and error handling in an orthogonal way.
the design engineers need to use high level formalisms to facilitate the development, maintenance, and documentation of the industrial control systems. these formalisms must permit the modeling, formal validation, and...
详细信息
the design engineers need to use high level formalisms to facilitate the development, maintenance, and documentation of the industrial control systems. these formalisms must permit the modeling, formal validation, and code generation to PLC. this paper discusses statechart for modeling of industrial systems, and presents a case study that simulates the general schema of the industrial automation process, based in PLC. the case study was implemented with Java technologies, and was simulated using the execution environment developed by the Jakarta Project Commons SCXML.
Requirements engineering, the first phase of any software development project, is the Achilles' heel of the whole development process, as requirements documents are often inconsistent and incomplete. In industrial...
详细信息
ISBN:
(纸本)9783540733508
Requirements engineering, the first phase of any software development project, is the Achilles' heel of the whole development process, as requirements documents are often inconsistent and incomplete. In industrial requirements documents natural language is the main presentation means. In such documents the system behavior is specified in the form of use cases and their scenarios, written as a sequence of sentences in natural language. For the authors of requirements documents some facts are so obvious that they forget to mention them. this surely causes problems for the requirements analyst. Missing information manifests itself, for example, in sentences in passive voice: such sentences just say that some action is performed, but they do not say who performs the action. In the case of requirement analysis this poses a serious problem, as in every real system there is an actor for every performed action. there already exists an approach able to guess missing actors and actions. However, the existing approach is able to handle sentences containing exactly one verb only. the approach presented in this paper extends the existing one by treatment of compound sentences and passive voice. Feasibility of the presented approach to the treatment of passive and conjunctions was confirmed in a case study.
暂无评论